ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"

  • MicroScope – December 2019: Time for change

    Sponsored by: MicroScope

    In this issue, we ask experts how they're approaching digital transformation to meet customers demand, and we look at whether the actions of the user should reflect on the accountability of the cloud provider

  • Essential Guide: Securing hybrid IT infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

  • Jargon buster guide to database management

    Sponsored by: TechTarget ComputerWeekly.com

    This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.

  • Computer Weekly – 21 May 2024: Can AI supercharge human creativity?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to Getty Images about the challenges of balancing human creativity with the risks and opportunities of GenAI. Our latest buyer's guide examines the best desktop IT management practices in a world of flexible working. And we review the benefits of open source software in the enterprise. Read the issue now.

  • Beginner's guide to Internet of Things

    Sponsored by: TechTarget ComputerWeekly.com

    The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.

  • Computer Weekly – 21 August 2018: Delivering the potential of the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.

  • The Business Value of Red Hat Ansible Automation Platform

    Sponsored by: Red Hat

    In this IDC report, you will learn about the business benefits of using Red Hat’s Ansible automation solution. Highlights from the report include:$8.54 million higher revenue per organization per year36% development team productivity gainsRead the full, 30-page report to explore the ROI you could receive from using Ansible.

  • Computer Weekly - 5 April 2022: Police use of AI needs overhaul to prevent abuse

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a House of Lords inquiry calls for a rethink on how police forces use AI technologies – we examine the issues. Our new buyer's guide looks into edge datacentres. And the EU and US agree a new data protection deal to replace Privacy Shield, but will it stand up to scrutiny? Read the issue now.

  • Focus: Accelerating change for women in tech

    Sponsored by: TechTarget ComputerWeekly.com

    This e-guide looks at the opinions many industry experts have on how to accelerate the number of women in the technology industry and why doing so is important.

  • Computer Weekly – 6 August 2019: Using tech to boost staff morale

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.